Quantcast
Channel: Veeam Software Official Blog
Browsing all 465 articles
Browse latest View live

Elevating Data Security: Veeam Backup & Replication and Veeam ONE v12 Achieve...

In the dynamic world of data security, certifications are the cornerstone of trust, assuring a product’s resilience against potential threats. The recent attainment of Common Criteria (CC)...

View Article


Image may be NSFW.
Clik here to view.

Best Practices for Secure Hybrid and Multi-Cloud Backup

Cloud computing has become ubiquitous and has reached the point where nearly half of all workloads run in the cloud. Currently, most organizations operate a combination of on-premise and cloud...

View Article


Image may be NSFW.
Clik here to view.

Assessing Veeam Backup Regarding Gartner’s Considerations for Microsoft 365

Welcome to the final segment of our three-part blog series where we evaluate how Veeam Backup for Microsoft 365 aligns with Gartner’s recommendations for Microsoft 365 data protection and Microsoft’s...

View Article

Image may be NSFW.
Clik here to view.

The Top 5 Benefits of Automating Your Cybersecurity Plan

Is your organization one of the 85% that suffered a ransomware attack in the last year? Ransomware attacks are increasing in both frequency and intensity. Leading data protection provider, Veeam,...

View Article

How Resilient Is Your Business? Discover the Key Factors

How resilient is your company? Most businesses aren’t as resilient as they think. Historically, backup and recovery processes for IT and cloud environments are: Composed of manual processes to...

View Article


Image may be NSFW.
Clik here to view.

Veeam Backup for Nutanix AHV v5

In today’s cost-conscious world, enterprises are continually evaluating and adopting new preferred infrastructure vendors, whether it be driven by total cost of ownership, features or overall...

View Article

Mastering Managed Backup as a Service (BaaS) In the Age of Hybrid and...

In a recent survey conducted by Vanson Bourne1, 83% of organizations agree that the hybrid multi-cloud approach stands as the preferred backup strategy. Considering this surge in digital...

View Article

Ransomware Prevention: Safeguarding Your Digital World

Ransomware is an issue that many companies run into. According to the 2023 Ransomware Trends Report, 85% of companies surveyed experienced at least one cyberattack in the last 12 months. Of those...

View Article


The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and...

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy...

View Article


Image may be NSFW.
Clik here to view.

Comprehensive Guide to SIEM (Security Information & Event Management)

Security Information & Event Management (SIEM) systems are an essential part of any modern cybersecurity toolbox that helps the SOC collect, detect, investigate and respond to internal and...

View Article

Image may be NSFW.
Clik here to view.

Stay Safe Out There: Reflecting on 20 Years of Cybersecurity Awareness Month

Picture it: you’re about to go out of town for a week and you’ve programmed your home’s smart thermostat to know your schedule so you’re not paying for heating or cooling you’re not using while you’re...

View Article

Image may be NSFW.
Clik here to view.

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and...

View Article

Image may be NSFW.
Clik here to view.

Mastering YARA Rules: Malware Detection and Analysis

Introduction One of the most important ways to safeguard your business is to ensure strong protection against malware attacks. If malware gains a foothold, it can be used to extort money, gather...

View Article


Image may be NSFW.
Clik here to view.

What Is Separation of Duties in Cybersecurity?

Separation of Duties (SOD) in cybersecurity, also known as Segregation of Duties, is a form of risk management that is often used in cybersecurity to mitigate insider threats and reduce the risk of...

View Article

Image may be NSFW.
Clik here to view.

Getting Started with Kubernetes Security: A Beginner’s Guide 

Understanding Kubernetes Architecture Kubernetes is an open-source container orchestration platform that automates the deployment, scaling and management of containerized applications. It is...

View Article


Image may be NSFW.
Clik here to view.

A Comprehensive Guide to Salesforce Backup Solutions

If you were to approach one of the hundreds of thousands of people who use Salesforce daily and ask them the last time they backed up their data, they would probably have no idea. Why would it be...

View Article

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More

Introduction In today’s digital landscape, the adoption of cloud computing has transcended beyond just a technological trend; it’s now a business imperative. Companies, irrespective of size or sector,...

View Article


Image may be NSFW.
Clik here to view.

How Cisco & Nutanix’s Alliance Impacts Veeam Users

As Josh Druck outlined in his September 14th blog, Veeam has longstanding technical relationships with both Cisco HyperFlex and Nutanix. In this blog, I would like to explore what the recent Cisco and...

View Article

What is Cyber Resilience?

Understanding the Framework of Cyber Resilience With the ever-increasing growth across the digital landscape, having a strong security posture is no longer enough. More than ever, organizations of all...

View Article

What is Enterprise Hybrid Cloud?

Cloud computing offers a scalable, flexible way for organizations to manage their IT resources. A hybrid cloud combines resources from different computing environments to allow the sharing of...

View Article
Browsing all 465 articles
Browse latest View live